DarkWebNext Gen Security. Perspective Changes!

Next Gen Security. Perspective Changes!

Established models of cyber security are changing. And, they are changing fast. This change is driven by three key factors.

  • Increasing span and complexity of the cyber infrastructure
  • Emergence of some key new technologies
  • Adaptive and super agile nature of threats

Out current set of security technologies, which are mostly based on the principles, architectures and perspectives of ‘internet, network and enterprises models’ of late 1990s and early 21st century, are destined to get into oblivion within this decade.

This article talks about some of the key elements of new thought framework, which most of the CISO and CIOs will be adopting or have already adopted.

Key elements will be along the lines of following points:

These four points indicate a departure of the old and prevalent thought model of security, which is hinged around

  • Lock it
  • Check it
  • Keep identification of who did what

It is a well established fact that no matter how much security measures and technologies are adopted, something will be amiss, or else, someone will come up with smarter way of stealing things. With this hindsight, it is only reasonable that we are departing from the lock and check model of security.

Reduction of Attack Surface –>

One of the emerging thought elements in security strategy design and corresponding operational model is a realization that one smart way of reducing the threats is to reduce the attack surface, which an attacker has into your organization. It is a late realization but an apt one. Seemingly unrelated actions, which reduce attack surface, can have significant positive impact on your security posture.

One such example will be, using shared/virtual desktop environment, without local storage capability. For too long, we have had full fledged PCs being used by people, who will never use any productivity application, which might need local computing resources. A removal of PCs and replacing them with a VD setup will reduce the point of entries for your environment. This will lead of reduction of attack surface.

There are many many more such attack surface reduction possibilities. Look deeper, and, you will find opportunities in almost all IT ops and security ops to reduce the attack surface.

Improve Detect and Respond Capability

Threats today have emergence and damage time interval, ever shorter than ever. From the time a new threat is introduced in the hyper-connected world, to point, where your enterprise is at risk, there is hardly anytime. It can be mostly represented in hours.

With this kind of threat emergence and impact landscape, detection and response is more likely to save the day. Organizations have always had some detection and response processes, systems and technologies in place, with following caveats.

  • They can’t detect threats in real time
  • Response time is an issue
  • Response robustness is also an issue
  • Detection ability is limited to certain portions of setup

Today organizations need to start looking for technologies and response model, which is real time from both detection and action point of view. Specific technologies such as EDR can help improve detection at the points, which get neglected because of their sprawl factor.

Organizations will also need to start looking for options outside their internal security teams, where capacity, capability and / or bandwidth becomes an issue. MSSPs can come handy to create 24×7 detection ability, and, comprehensive response capability.

Predictive Identification of “Potential Risks & Threats”

Wealth of information about security is buried within the data and application vaults of the company itself. And this information is not only helpful in dealing with APTs. It is helpful in making decisions and protections smarter.

Most organizations have not figured out how to use the patterns, which exist within enterprise data, to take action and improve security posture. It is a challenging task from technology and procedure point of view.

A program like approach of collecting patterns, identifying concerns and threats, allocating responsibilities to people to take action, will work here. Organizations need to start developing an attitude and approach, to respect the patterns which lay within their own data.

On an increasing basis, CISOs will need to pivot their new strategies around thought framework represented by these three points.

It is only natural, to shift focus…

  • From asset to attack surface
  • Protective to preemptive
  • Lock all doors to ‘Respond Real-time’

Leave a comment:

Your email address will not be published. Required fields are marked *

Top
oh hello you
Award-winning
creative agency.
Delivering high-quality projects for international clients. Ask us about digital, branding and storytelling.

GENERAL INQUIRIES
borgholm@qodeinteractive.com

SOCIAL MEDIA

Privacy Policy

This Privacy Policy applies to the www.castellumlabs.com

Castellum Labs recognises the importance of maintaining your privacy. We value your privacy and appreciate your trust in us. This Policy describes how we treat user information we collect on http://www.castellumlabs.com and other offline sources. This Privacy Policy applies to current and former visitors to our website. By visiting and/or using our website, you agree to this Privacy Policy. Castellum Labs is a business unit of Raaga Technologies Private Limited and focuses on information technology and cyber security services and products.

Castellumlabs.com is brand and is a property of Raaga Technologies Private Limited, an Indian Company registered under the Companies Act, 2013 having its registered office at Workyard, 337, Phase 2, Industrial Area, Phase 1, Chandigarh, India - 160002.

Information we collect

Contact information. We might collect your name, email, mobile number, phone number, employer company, your designation, street, city, state, pin-code, country and IP address.

Payment and billing information. We do not conduct any online transaction and do not ask our website users for any kind of financial or payment information on our website.

Information you post. We collect information you post in a public space on our website or on a third-party social media site or asset or page or account or wall belonging to Castellum Labs.

Demographic information. We may collect demographic information about you or any other information provided by your during the use of our website with your consent and your approval. We might collect this as a part of a survey also.

We collect information in different ways.

We collect information directly from you. We collect information directly from you when you fill a query form or else when you drop a message to our number of else when you call our phone numbers. We also collect information if you post a comment on our websites or ask us a question through phone or email.

We collect information from you passively. We may use tracking tools like Google Analytics, Google Webmaster, browser cookies and web beacons for collecting information about your usage of our website and any associate web sites of ours.

We get information about you from third parties. For example, if you use an integrated social media feature on our websites. The third-party social media site will give us certain information about you. This could include your name and email address.

Use of your personal information

We use information to contact you: We might use the information you provide to contact you for confirmation of the answers for your queries posted on our website.

We use information to respond to your requests or questions. We might use your information to confirm your registration for a webinar or an event or a course published by us.

We use information to improve our products and services. We might use your information to customize your experience with us. This could include displaying content based upon your preferences.

We use information to look at site trends and customer interests. We may use your information to make our website and products better. We may combine information we get from you with information about you we get from third parties.

We use information for security purposes. We may use information to protect our company, our customers, our websites or our other digital assets on internet.

We use information for marketing purposes. We might send you information about special promotions or offers. We might also tell you about new services, features, products, reports or other offerings. These might be our own offers or products, or third-party offers or products we think you might find interesting. Or, for example, if you submit a query, we might enroll you for our newsletter with your consent.

We use information to send you transactional communications. We might send you emails or SMS about your account, registration or a query submitted by you.

We use information as otherwise permitted by law.

Sharing of information with third-parties

We might share information with third parties who perform services on our behalf. We share information with vendors who help us manage our online registration process or query processors or transactional message processors. Some vendors may be located outside of India.

We will share information with our business partners. This includes a third party who provide or sponsor an event, or who operates a venue where we hold events. Our partners use the information we give them as described in their privacy policies.

We may share information if we think we have to in order to comply with the law or to protect ourselves. We will share information to respond to a court order or subpoena. We may also share it if a government agency or investigatory body requests. Or, we might also share information when we are investigating potential fraud.

We may share information with any successor to all or part of our business. For example, if part of our business is sold we may give our customer list as part of that transaction.

We may share your information for reasons not described in this policy. We will tell you before we do this.

Email Opt-Out

You can opt out of receiving our marketing emails. To stop receiving our promotional emails, please email unsubscriber@castellumlabs.com. It may take about ten days to process your request. Even if you opt out of getting marketing messages, we will still be sending you transactional messages through email and SMS about your queries.

Third party sites

If you click on one of the links to third party websites, you may be taken to websites we do not control. This policy does not apply to the privacy practices of those websites. Read the privacy policy of other websites carefully. We are not responsible for these third-party sites.

Grievance Officer

In accordance with Information Technology Act 2000 and rules made there under, the name and contact details of the Grievance Officer are provided below:

Mrs. Rinky (Sukriti) Shukla

Workyard, 337, Phase 2,
Industrial Area, Phase 1,
Chandigarh, India - 160002

Phone: +91 - 86399 53505
Email: sukriti.shukla@castellumlabs.com

If you have any questions about this Policy or other privacy concerns, you can also email us at privacy@castellumlabs.com

Updates to this policy

This Privacy Policy was last updated on 20.12.2025. From time to time we may change our privacy practices. We will notify you of any material changes to this policy as required by law. We will also post an updated copy on our website. Please check our site periodically for updates.

Jurisdiction

If you choose to visit the website, your visit and any dispute over privacy is subject to this Policy and the website's terms of use. In addition to the foregoing, any disputes arising under this Policy shall be governed by the laws of India.

Annual Summary Report

Please provide your details to access the report.